Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalizing Fair Reachability Analysis to Protocols with Arbitrary Topology (Abstract)., and . PODC, page 267. ACM, (1995)Recovering the Lattice of Repetitive Sub-functions., , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 956-965. Springer, (2005)Minimizing Coordination Channels in Distributed Testing., , and . FORTE, volume 4229 of Lecture Notes in Computer Science, page 451-466. Springer, (2006)An EFSM-Based Passive Fault Detection Approach., and . TestCom/FATES, volume 4581 of Lecture Notes in Computer Science, page 335-350. Springer, (2007)Dependence Testing: Extending Data Flow Testing with Control Dependence., and . TestCom, volume 3502 of Lecture Notes in Computer Science, page 23-39. Springer, (2005)Regression test suite reduction using extended dependence analysis., , and . SOQUA, page 62-69. ACM, (2007)A Test Derivation Method for Protocol Conformance Testing.. PSTV, page 347-358. North-Holland, (1987)Test Generation by Exposing Control and Data Dependencies Within System Specifications in SDL., and . FORTE, volume C-22 of IFIP Transactions, page 335-350. North-Holland, (1993)Corba-Based Telecom Application of Distributed Object Computing., , , and . Applied Informatics, page 58-60. IASTED/ACTA Press, (1999)Electing a Leader in a Synchronous Scalable Network., and . ICCI, volume 468 of Lecture Notes in Computer Science, page 463-472. Springer, (1990)